Categories
Net Software

Interesting article on PC Myths

PCWorld has a good write up on PC myths… but read carefully as their ratings seem to contradict the text at times.  They rate the responding to Spam myth as a level 4 out of 5 on the bogus meter but then include this quote:



“Knowing who to opt out from is key,” says Schwartz. “Opting out of legitimate companies drops you off their lists, but when you do that with ‘real’ spammers, the results are unclear.”


So, what is it?  A myth?  If the results are unclear can you be sure?


A summary of the myths (go to the article for full details).



Busting the Biggest PC Myths
We expose the bad advice that wastes your time and money.




  1. Magnets zap your data.
  2. Using a cell phone on a plane interferes with the navigation and communications systems of the aircraft.
  3. If you don’t ‘stop’ a USB device before unplugging it from a PC, you’ll screw things up.
  4. Cookies track everything you do on the Internet.
  5. Windows’ Japanese edition uses haiku error messages.
  6. Terrible things happen if you turn off your PC without shutting down Windows.
  7. Opting out of spam gets you even more spam.
  8. Hackers can destroy data on your computer’s hard drive.
  9. Turning off your PC daily to save power shortens its life.
  10. The government reads everyone’s e-mail.
  11. Saddam Hussein bought PlayStation 2 consoles to use in Iraq’s weapons program.
  12. DOS is dead.
  13. Only a pricey surge protector can keep your devices safe.
  14. If you don’t periodically run your laptop batteries down to zero, you’ll lose battery life.
  15. If you don’t use an antistatic wrist strap while tinkering with a PC, you’ll ruin hardware.

Categories
Software

I stand corrected

So, after being all annoyed and stuff by the overly-complicated error message given to me by the OneNote updater I decided to follow the directions.  Guess what?  It helped me fix my problem.


Could my Mom have done this?  No (i.e. I can maintain some small amount of righteous indignation).

Categories
Software

You’re joking, right?

Ah… a well thought-out dialog is a thing of beauty…


Categories
Hotmail

Safe list, address book, mailing list… what’s the deal?

Receiving mail from friends shouldn’t involve searching through a bunch of potency ads in your junk e-mail folder.  If you want to make sure you receive these messages you need to tell the Hotmail server who your friends are (only you can decide if you want to receive mail from your friends).  There are a few lists provided in Hotmail to help you “safe list” mail you’d like to receive: your contact list, safe list and mailing lists list (say that three times fast).


Why so many lists?  Here’s a good way to view the lists:


Contacts: These are people to whom you send e-mail.



Hotmail’s contact manager stores the same type of information you keep in your PDA, little black book or in the pile of wadded up business cards you haven’t quite gotten around to organizing.  You can enter address info, phone numbers and, most importantly for this topic, an e-mail address.  Any e-mail address you enter into your Hotmail contacts will be treated as a friend… Hotmail will avoid junking the mail from your friends.


To add contacts: Sign into Hotmail and click the “Contacts” tab at the top of the page.
Extra tip:  Look in the left-hand column under “Tools” for some ways to quickly build your contact list.



Safe list: These are addresses from which you receive e-mail but to which you rarely (if ever) send e-mail.



The safe list is the perfect place for you to enter the e-mail addresses or domains of companies from whom you’d like to receive e-mail but to whom you don’t send mail.  Why fill up your contact list with extra items when you don’t send mail to them?  It makes it harder to find contacts when you need to.


To add to your safe list:  Sign into Hotmail and click the “Contacts” tab at the top of the page.  Look in the left-hand column for “Safe List”.  Click the “Safe List” link then enter e-mail addresses clicking the “Add” button after each address.
Extra tip:  If you receive a lot of mail from one domain (e.g. all your co-workers send mail from [worker]@microsoft.com) you may enter a domain in the safe to cover all addresses from the domain.


Mailing lists: These are addresses where the sender changes often but the recipient doesn’t (and the recipient isn’t your address)



If you subscribe to an e-mail mailing list you’ll find using one of the first two lists is unlikely to work well.  The problem occurs most with discussion lists since the mail will always come from some random subscriber and go to the list.  Since you don’t want to maintain a list of all the people subscribed you can, in this case, indicate that mail to the list is safe.  Hotmail will look at incoming mail and avoid junking it if the mail is addressed to an address on your mailing lists.


To add to your mailing lists list: Sign into Hotmail and click “Options” (the link is near the top right, next to “Help”).  In the left-hand column click “Mail” then click “Junk E-Mail Protection” in the main (white colored) section.  The mailing lists link will take you to the entry form.  The form accepts only e-mail addresses, it won’t accept simply a domain.
Advanced user tip:  If you have an old account which forwards mail to your Hotmail account Hotmail will junk the e-mail because it’s not to your Hotmail account (it’s to your old account).  If you list your old account address as a mailing list Hotmail will accept the incoming mail.

Categories
Hotmail

More work news

Exciting news was announced at the end of last week, I am now the Lead Program Manager for the Hotmail feature team!  Yay me!  I’m really excited about the new challenges coming up (and a little nervous too as it’s going to be a whole new type of work).  It’s going to be a ton of fun and I already know I enjoy working with the other two front door leads, Denise (business) and Omar (infrastructure).  Making this whole thing a lot less frightening: I am inheriting an awesome team, In order for me to fail I would to work at it (I don’t plan on failing :)).


While I’m excited to take on this new challenge it does come with one disappointing aspect: my previous manager, Jen, has decided to take a new role up in Redmond.  Her new team is gaining a tremendous resource, I’m jealous.

Categories
Weird

Judge gives stiff sentences

Oklahoma Judge Accused Of Pleasuring Himself In Court


State AG Seeks Judge’s Removal From Bench


OKLAHOMA CITY — Oklahoma Attorney General Drew Edmondson asked a state court Thursday to remove a Creek County judge from the bench for allegedly using a sexual device during court proceedings.


The petition asks the Oklahoma Court on the Judiciary to remove Judge Donald Thompson, who is accused of using a penis pump during court proceedings.


Full article

Categories
Weird

Maybe it’s something they ate…

Did I not get the memo that it’s open season on doing crazy stuff with food?


Categories
Net Weird

It’s a weird world

I’m always amazed at how far the on-line world has come in the last ten years.


I’m even more amazed at how much I assume everyone else is amazed by that. 



  • I live in a special little world called Silicon Valley.

  • I live in a world where everyone has an e-mail address (and most have three). 

  • I live in a world where I look suspiciously at any business that doesn’t have a web site (even Internet addiction centers have web sites).

  • I live in a world where anything that can’t be Googled doesn’t exist.

  • I live in a world where most things that can be Googled still don’t exist (killed in a rocket car?  yeah, right).

  • I live in a world where WWJD stands for What Would Jobs Do?

  • I live in a world where people will buy a Mini because it’s compatible with their iPod.

  • I live in a world where a reality distortion field isn’t science fiction, it’s protected by the ADA.

  • I live in a world where the coolest computer company only has a fraction of the market and makes most of their money selling MP3 players.

  • I live in a world where a project doesn’t end when you ship, it ends when you get the T-Shirt.

Ah… paradise.

Categories
Microsoft Security

New security threat

Update: Patch for part of the problem:
http://www.microsoft.com/downloads/details.aspx?FamilyId=4D056748-C538-46F6-B7C8-2FBFD0D237E3&displaylang=en





On line news sources have picked up ISC’s warning of a new threat to IE users which could allow hackers to steal on line banking passwords.  The code exploits a combination of a hole in unpatched IIS web servers to install malicious pop ups and a hole in IE to install a program via that pop up. The installed program watches for connections to a specific set of banking sites and logs the username and password (yet another reason everyone should get a pop up blocker, I’m so glad XP SP2 comes with pop up blocking as part of its greatly enhanced security).


Unfortunately the articles don’t do anything to help users understand what they should do to protect themselves from this attack or even if there is anything they can do. The reason for this lack of info is there is little users can do to defend against this exploit, even for advanced users. This is very scary to users of any level.


So… what should users do?  Here are my suggestions (yeah, these are my suggestions, my employer hasn’t approved them etc.)


Users of Windows XP can protect themselves by upgrading to Windows XP service pack 2, RC2 (RC2 means “release candidate 2”, i.e. it’s not the final version). Early adopters may rejoice and the braver among you may jump on board. I’ve been running SP2 for a while now and my personal opinion is: RC2 is great, but just in case you should back up your stuff and choose the install option which allows you to remove it if you have second thoughts later on. Unfortunately SP2 RC2 is a “preview” and isn’t supported by us yet. 🙁


Users should also review the ISC list of targeted bank URLs (scroll down through the report to find the list). If users have visited any of those sites recently they should seriously consider changing their banking password. By the law of averages users who get frequent pop up advertisements are the most at risk (regardless of the type of site you visit).


For users of earlier versions of Windows or people who aren’t willing to install the unsupported RC2 release there isn’t a fix yet, but there will be a fix in a couple weeks (no date has been announced yet). To help protect users until the patch has been fully tested Microsoft is working with law enforcement to shut down all the sites known to be hosting the exploit.


On a related note, if you don’t update your system regularly, you really should.  I’ve set Windows to automatically update my machines every night at 3am if needed.  Some worry automatic updates will cause problems but here’s my anecdotal data: I’ve been running automated updates on my very non-standard PC (a dual processor, 500 MHz Celeron with additional hardware that hasn’t been approved for Windows 2000 much less XP) for as long as it’s been available – I have never had a problem caused by the automatic updates.  Besides, the problems created by not updating far outweigh the possible problems you might encounter with the automatic updates.  Also, the automatic updates don’t include hardware drivers in the vast majority of cases (and it’s the hardware driver updates that cause many upgrade problems people encounter).


Some more details from ZDNet: http://zdnet.com.com/2100-1105_2-5251981.html?tag=nl

Categories
Hotmail Microsoft

Movement from the Mac guys

A couple big changes this week involving the guys from the Mac team (I used to test PWS, IMN, OE and Entourage for the Mac team):


Tantek Çelik has decided to leave the MS fold and strike out into the world.  Tantek was a key player in the IE browser for Mac and is well known for his CSS contributions.  He also worked to get his teams’ excellent rendering engine into one of our set top boxes, unfortunately without success.  He has a great summary of his MS work in his open farewell letter.  He has yet to announce his next project.


Also related to Microsoft Set top boxes, Dick Craddock has come on board with Hotmail as the Front Door Development manager (we call the servers which host all the chrome and features for Hotmail the “Front Door” machines because users enter through the front door).  Back in 1998 when Microsoft bought Hotmail the Mac Internet client team (IE and OE) in San Jose was kind of cut in two as many people went “downstairs” to work on the newly acquired service.  Dick took the reigns and I had the pleasure of reporting to him for a time.  Dick moved buildings along with the Mac IE team and went to work on Ultimate TV and then onto other MS TV products.  Now, almost six years later, I get a chance to work with him again.  Dick’s migration is 100% upside for Hotmail.


I moved from the Mac group to Hotmail in ’98.  Kristin, who used to report to me as a tester, joined later.  Omar, who first came to MS as an intern in my team, is now a lead here.  Dick, to whom I used to report, is now a dev manager here.  Hey, the world does revolve around me!